Context: With the Aditya-L1 spacecraft expected to reach the Lagrangian Point (L1) on Saturday, the Indian Space Research Organisation (ISRO) will attempt a crucial manoeuvre to bind the spacecraft to an orbit around L1.
About the mission:
- Aditya-L1 marks India's inaugural space-based observatory-class solar mission designed to scrutinize the Sun from a considerable distance of 1.5 million kilometers.
- The spacecraft is projected to take approximately 125 days to reach its destination, positioned at the Lagrangian point 1 (L1) of the Sun-Earth system.
- Aditya-L1 is significant as it represents ISRO's second venture into astronomy observatory-class missions, following the successful launch of AstroSat in 2015.
- In terms of travel time, Aditya-L1 boasts a notably shorter journey compared to India's prior Mars orbiter mission, Mangalyaan.
- The spacecraft is slated to be placed in a halo orbit around the Lagrangian point 1 (L1), a unique position in the Sun-Earth system offering an optimal vantage point for solar observations.
-Mission Objective:
- The principal objective of the Aditya-L1 mission is to furnish significant insights into various components of the Sun, encompassing the solar corona, photosphere, chromosphere, and solar wind.
- The mission is specifically geared towards acquiring a more profound understanding of the Sun's behavior. This includes an in-depth exploration of its radiation patterns, heat emissions, particle flow, and magnetic fields.
- A crucial facet of Aditya-L1's mission objective is to comprehend how the Sun's dynamic attributes, as studied, influence Earth. This encompasses exploring the effects of solar radiation, heat, particle interactions, and magnetic fields on our planet.
Lagrange Points:
- Lagrange points are specific positions in space where the gravitational forces between two substantial orbiting bodies, like the Sun and the Earth, reach an equilibrium.
- At Lagrange points, a small object, such as a spacecraft, can remain in a relatively stable orbit due to the balanced gravitational forces. This allows the object to maintain its position with minimal fuel consumption.
- There are five Lagrange Points, each characterized by unique attributes. They facilitate the stable orbit of smaller masses between two more massive celestial bodies.
1. L1: Recognized as the most crucial for solar observations, L1 is ideal for continuous viewing of the Sun without eclipses. It currently hosts the Solar and Heliospheric Observatory Satellite (SOHO).
2. L2: Positioned directly 'behind' Earth concerning the Sun, L2 offers excellent conditions for observing the broader Universe without interference from Earth's shadow. The James Webb Space Telescope orbits the Sun near L2.
3. L3: Located behind the Sun and beyond Earth's orbit, L3 presents opportunities for observations of the far side of the Sun.
4. L4 and L5: Objects at L4 and L5 maintain stable positions, forming an equilateral triangle with the two larger bodies. These points are often utilized for space observatories studying asteroids and other celestial phenomena.
Context: Nepal signed a long-term agreement for the export of 10,000 MW power to India in the next 10 years and an MoU for cooperation in renewable energy .
Status of India-Nepal Relations:
Defense Cooperation:
- India supports Nepal Army in modernization through equipment, training, and joint military exercises.
- The Gorkha regiments of the Indian Army recruit soldiers from Nepal, with around 32,000 Gorkha soldiers serving in the Indian Army.
Disaster Management:
- India provided rapid assistance during the 2015 earthquake, including rescue teams, relief materials, and medical support.
- Total relief assistance exceeded $67 million, and India announced a $1 billion post-earthquake reconstruction package.
Infrastructure Development:
- India actively contributes to Nepal's development in infrastructure, health, water Resources, education, and rural development.
- Collaboration on border infrastructure, roads, and rail links is significant, and Indian companies are major investors in Nepal.
Water Resources Cooperation:
- Agreements for power exchange and transmission exist, with India supplying around 600 MW of power to Nepal.
- Mechanisms for discussing water Resources and hydropower cooperation are established.
Education:
- India contributes to human Resource development in Nepal, offering scholarships and seats for various courses.
Cultural Exchange:
- Cultural exchanges and people-to-people initiatives are integral, with agreements between Indian and Nepalese cultural and media organizations.
Challenges:
1. Issues with Peace and Friendship Treaty.
2. Territorial Disputes in areas like Kalapani.
3. Chinese Influence.
4. Security Threats due to a porous border.
5. Trust Deficit over project delays and perceived interference.
Way Forward:
- Resolve water issues through diplomatic talks based on international law.
- Increase investments and expedite project completion for a positive image.
- Counter China's influence by addressing economic cooperation challenges.
- Explore realistic solutions for the border dispute, drawing lessons from India-Bangladesh resolution.
Conclusion:
India-Nepal's historic ties are crucial for economic and strategic interests. A friendly Nepal acts as a buffer between India and China. Constructive engagement and enhanced cooperation are vital for long-term mutual benefits.
Context: A Chinese student who was a victim of ‘cyber kidnapping’ has been found in rural Utah, unharmed. The 17-year-old, Kai Zhuang, was reported missing on December 28. By the time the police traced him, his parents back in China had paid $80,000 in ransom.
What is cyber kidnapping?
Process:
Cyber kidnapping, also known as virtual kidnapping, is a form of cybercrime where perpetrators deceive victims into believing that they or their loved ones are in danger or have been kidnapped. The perpetrators then demand ransom in exchange for the safety of the supposed victim. The process typically involves the following steps:
Deception: Scammers contact the victim and their family separately, persuading the victim that their family is being threatened or that they have been kidnapped.
Isolation: The victim is coerced into isolating themselves, often in a remote location, and providing proof of their captivity, such as sending photos that make it appear as though they are being held captive.
Ransom Demand: The cybercriminals then use these photos to convince the family that their loved one has been kidnapped and demand ransom, using fear and emotional manipulation to pressure the family into complying with their demands.
Extortion: The scammers continue to extort the family by using fear, tactics, photos, and voice recordings of the victim to maintain the pressure on the family to pay the ransom.
Factors responsible for such crimes:
Several factors can make individuals more vulnerable to cyber kidnapping crimes. Some of these factors include:
Lack of Awareness: Individuals who are not aware of the tactics used in cyber kidnapping and the warning signs are more susceptible to falling victim to these crimes.
Technological Advances: The use of artificial intelligence and other advanced technologies by perpetrators can make their schemes more sophisticated and difficult to trace, increasing the risk for potential victims. Experts believe that with the rise of Artificial Intelligence (AI), such crimes can rise, as scammers can send people voice notes that sound exactly like a loved one in distress.
Case study: Last year, an Arizona woman testified in the US Senate about receiving just such a call. When Jennifer DeStefano picked up a call from an unknown number, “her 15-year-old daughter”, crying, told her some “bad men” had her. A man then threatened her and demanded ransom. After she cut the call, she called up her daughter, and realised she was safe. |
Social Media Exposure: Perpetrators often use social media platforms to gather information about potential victims, allowing them to gain valuable insight into an individual's life and making their schemes more convincing.
Isolation: Cyber kidnappers force victims into isolating themselves, making it more challenging for them to seek help or verify the authenticity of the threats.
Emotional Manipulation: Perpetrators use emotional manipulation and threats to coerce victims and their families into complying with their demands, particularly by creating a sense of urgency and fear.
Language and Cultural Barriers: Perpetrators can target individuals in different languages and from various cultural backgrounds, making it easier for them to exploit vulnerabilities and create convincing scenarios
Solutions:
Digital Hygiene: Use strong passwords, unique usernames, and two-factor authentication to protect your accounts from hackers. Do not share confidential information with anyone, and use a password manager to keep track of your passwords
Phishing Awareness: Be wary of unsolicited emails, texts, or calls, especially those requesting personal information or prompting urgent action. Do not click suspicious links or attachments
Secure Internet Connection: Avoid public Wi-Fi networks for sensitive activities such as online banking or shopping. Use a virtual private network (VPN) to encrypt your internet connection and protect your online activities
Verify Identities: Confirm the identity of the person sending the messages or making the calls. Do not trust unsolicited messages or calls, and verify the identity of the person before sharing any personal information
Stay Informed: Stay informed about common cyber threats and scams. Awareness is a key defense against falling victim to manipulation and extortion attempts
Consult Professionals: If you believe you have become a target of cyber kidnapping, consider consulting with cybersecurity professionals or law enforcement for assistance
By taking these proactive steps, individuals can significantly reduce their risk of falling victim to cyber kidnapping.
Context: recently Kochi–Lakshadweep submarine optical fibre cable project was inaugurated , implemented at a cost of ₹1,072 crore, which will connect the islands to high-speed internet for the first time, after years of relying on limited satellite bandwidth.
About the project:
Objective
Implementing Agencies:
Major Activities:
Benefits of the Project:
Context: NewSpace India Ltd. (NSIL), the commercial arm of the Indian Space Research Organisation, will launch GSAT-20 (renamed GSAT-N2), on board SpaceX’s Falcon-9 rocket during the second quarter of 2024.
About GSAT-20 Satellite:
Features:
Purpose:
Significance:
Technological Advancements:
LOG IN
Guru का मार्गदर्शन (Guru Mentorship)
Topic Wise Smart Notes
Modular Classes
Mock Test & Personalize Feedback
CREATE AN ACCOUNT
If you haven’t created your account yet, please Login HERE !
Guru का मार्गदर्शन (Guru Mentorship)
Topic Wise Smart Notes
Modular Classes
Mock Test & Personalize Feedback